What is the effect of following these commands and actions?
After installing a new SuSe Linux system, you wish to enhance the security of this computer. You
type in the following commands (with actions in parenthesis): grub (press Enter) md5crypt qwerty
(copy the result of this command) quit
gedit /boot/grub/menu.1st & password -md5 (Paste what you copied earlier)
(Save and close gedit)
What is the effect of following these commands and actions?
What is the proper command to restart a process?
During a test of your SuSe Linux machine, you have noticed a specific process that is no longer
working as desired. What is the proper command to restart a process?
what is the result of typing this command?
You are showing a colleague some of the commands available in Linux, and you type telinit 6 what
is the result of typing this command?
What of the following user accounts are given the correct default User Identifier and Group Identifier, assumi
What of the following user accounts are given the correct default User Identifier and Group
Identifier, assuming the system is running Red Hat Linux?
What is the correct command to add this user account?
You wish to add a new user to your Linux system. The user account is called Lnx_1,the password
is QW3RTY, and the group is Users. What is the correct command to add this user account?
What is the correct command to add this new group?
You wish to add a new group to your Linux system. The group is called SCNP_Admins, and is to
be given a Group Identifier of 1024. What is the correct command to add this new group?
which of the following is true?
At the root@linuxbox$ prompt on a Linux machine you type ls -l b.doc and the output reads:
-rw-rw-r–1 simonusers31337Oct 5 11:21 b.doc
According to this output, which of the following is true?
which of the following?
You are running a Linux Server for your organization. You realize after a security scan that the
Telnet service is accepting connections, which you do not want. In order to disable the computers
ability to accept incoming Telnet sessions, the easiest method for you to choose is which of the
following?
which of the following computers will implement IPSec method 4?
In Windows Server 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic
security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
will implement IPSec method 4?
Which of the following is the reason that this is not the case?
In your Windows 2003 Active Directory enabled network it has been decided that Dynamic DNS
will be implemented. Once implemented this should help to minimize IP address to name mapping
issues. One of your assistants wonders if using DDNS will present a single point of failure for the
network. Which of the following is the reason that this is not the case?